A blog covering security and security technology.
  1. The NSA on the Risks of Exposing Location Data

    The NSA has issued an advisory on the risks of location data. Mitigations reduce, but do not eliminate, location tracking risks in mobile devices. Most users rely on features disabled by such mitigations, making such safeguards impractical. Users should be aware of these risks and take action based on their specific situation and risk tolerance. When location exposure could be...
  2. Cybercrime in the Age of COVID-19

    The Cambridge Cybercrime Centre has a series of papers on cybercrime during the coronavirus pandemic....
  3. BlackBerry Phone Cracked

    Australia is reporting that a BlackBerry device has been cracked after five years: An encrypted BlackBerry device that was cracked five years after it was first seized by police is poised to be the key piece of evidence in one of the state's longest-running drug importation investigations. In April, new technology "capabilities" allowed authorities to probe the encrypted device.... No...
  4. Twitter Hacker Arrested

    A 17-year-old Florida boy was arrested and charged with last week's Twitter hack. News articles. Boing Boing post. Florida state attorney press release. This is a developing story. Post any additional news in the comments. EDITED TO ADD (8/1): Two others have been charged as well....
  5. Friday Squid Blogging: Squid Proteins for a Better Face Mask

    Researchers are synthesizing squid proteins to create a face mask that better survives cleaning. (And you thought there was no connection between squid and COVID-19.) The military thinks this might have applications for self-healing robots. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog...
  6. Data and Goliath Book Placement

    Notice the copy of Data and Goliath just behind the head of Maine Senator Angus King. This demonstrates the importance of a vibrant color and a large font....
  7. Fake Stories in Real News Sites

    Fireeye is reporting that a hacking group called Ghostwriter broke into the content management systems of Eastern European news sites to plant fake stories. From a Wired story: The propagandists have created and disseminated disinformation since at least March 2017, with a focus on undermining NATO and the US troops in Poland and the Baltics; they've posted fake content on...
  8. Survey of Supply Chain Attacks

    The Atlantic Council has a released a report that looks at the history of computer supply chain attacks. Key trends from their summary: Deep Impact from State Actors: There were at least 27 different state attacks against the software supply chain including from Russia, China, North Korea, and Iran as well as India, Egypt, the United States, and Vietnam.States have...
  9. Images in Eye Reflections

    In Japan, a cyberstalker located his victim by enhancing the reflections in her eye, and using that information to establish a location. Reminds me of the image enhancement scene in Blade Runner. That was science fiction, but now image resolution is so good that we have to worry about it....
  10. Friday Squid Blogging: Introducing the Seattle Kraken

    The Kraken is the name of Seattle's new NFL franchise. I have always really liked collective nouns as sports team names (like the Utah Jazz or the Minnesota Wild), mostly because it's hard to describe individual players. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read...

Copyright © 2020 • All Rights Reserved.Sensible Voice, LLC
1 High Street • Brandon, VT 05733 • Contact Us • Privacy Policy